American retailer Hot Topic reports being hit by repeated credential stuffing attacks that used valid credentials. The attacks were automated and repeated over a four-month period. “Following a careful investigation, we determined that unauthorized parties launched automated attacks against our website and mobile application on February 7, March 11, May 19-21, May 27-28, and June 18-21, 2023, using valid account credentials obtained from an unknown third-party source.”
Hot Topic is an American retail chain specializing in counterculture-related clothing and accessories, as well as licensed music. With 690 stores across the US, 10,000 associates and millions of online and instore customers, the exposed threat landscape is huge.
In the breach notification the company explained that hackers used customers stolen account credentials and to access their Rewards accounts multiple times. The company said they were not the source of the stolen credentials and still have no idea where the credentials came from.
The company did say that they have taken “specific steps to safeguard our website and mobile application from” credential-stuffing attacks. Because the company was unable to discern between unauthorized and legitimate logins, they would be notifying all customers that had their accounts accessed during the cyberattacks of potential abuse of their credentials.
The information possibly exposed includes:
- Full name
- Email address
- Order history
- Phone number
- Date of birth
- Shipping address
- Last four last digits of saved payment cards
Ted Miracco, CEO, Approov Mobile Security had this comment:
“Mobile apps for retailers must take the same specific steps to safeguard their website as fintech and healthcare companies, as they are also in possession of valuable client data and vulnerable to automated “credential stuffing” attacks. This includes deploying bot protection software designed to stop such attacks.
“While Hot Topic stated that they have been working with outside cybersecurity experts, it is not clear why they did not implement mobile app attestation specifically? Mobile app attestation is a very inexpensive security measure that ensures only authentic apps access a backend service, stopping bots, and tampered or repackaged apps. This is an attack where known solutions existed, and it is inexcusable that more precautions were not taken by the management team at Hot Topic.”
Carol Volk, EVP, BullWall follows up with this:
“Retailers are in a tough spot when it comes to preventing credential stuffing attacks. For starters, as we see here, there is no such thing as a “strong password”, because hackers are not trying to guess our passwords, but leveraging stolen passwords. Whether your password is ‘1234’ or an 18 character string with numbers and symbols, the bad guys already have it. The best way to safeguard against the use of compromised credentials is to require MFA. Unfortunately, retailers know that customers will not tolerate the friction of MFA just to order a t-shirt, a pizza or a movie ticket, so we remain at risk.”
Emily Phelps, Director, Cyware:
Strong security hygiene is critical to defend against credential stuffing. Consider the following recommendations:
- Use multifactor authentication (MFA) whenever available, to enable added layers of security.
- Strong passwords or passphrases that are long enough to make it difficult for an adversary’s tools to figure out.
- Use a password manager with encryption to safely store and maintain unique, long passwords.
- Limit the number of login attempts from a single IP address within a specified time frame.
- Adopt AI/ML technologies that are designed to recognize and block credential stuffing attempts by identifying abnormal behavior patterns.
- Consider biometric alternatives.
Hopefully there’s accounting of what was actually exposed rather than what was potentially exposed. And that accounting happens soon. That way victims of this hack can take the required steps to protect themselves.

Radiant Logic Recognized as a Representative Vendor in 2023 Gartner Market Guide for Identity Governance and Administration
Posted in Commentary with tags Radiant Logic on August 3, 2023 by itnerdRadiant Logic, the Identity Data Fabric company, today announces its inclusion as a Representative Vendor in the recently released Gartner Market Guide for Identity Governance and Administration (IGA). Together with its expertise in complex identity environments, and its recent acquisition of Brainwave GRC’s advanced identity analytics capabilities, Radiant Logic is uniquely positioned as an operationally mature IGA solution.
Designed to help security and risk management leaders understand IGA capabilities and future trends when making decisions for their organization, the Gartner Market Guide for Identity Governance and Administration recommends leaders “choose IGA solutions which align with identity-first security principles that apply context, continuity and consistency to manage identity sprawl.”
Radiant Logic’s identity-first approach unifies information from disparate sources across legacy and cloud infrastructures to stop identity sprawl and create an authoritative data pipeline that drives: Zero Trust Architecture; merger and acquisition integrations or divestitures; cloud migration initiatives; workforce and customer identity and access management; directory modernization efforts; and more.
With the acquisition of Brainwave GRC, and powered by years of expertise in data delivery, RadiantOne now delivers advanced analytics and insights into real-time user behavior within an enterprise environment, transforming how organizations detect and prevent cyberattacks, fraudulent activity, lateral movement from insider threats, and more.
Gartner states: “By 2026, the analytics functionality in IGA tools will advance, and those organizations that have fully adopted and implemented AI/ML-based IGA analytics will see their access administration and governance costs 50% lower than their peers.” The report also recommends that SRM leaders “Accelerate the realization of business value from IGA investments by selecting IGA solutions with strong IGA analytics capabilities, implementing these capabilities, and measuring outcomes using outcome-driven metrics.”
Radiant Logic’s analytics-driven governance capabilities leverage RadiantOne’s expertise in accessing and managing identity data for admin and access decisions. With the integration of Brainwave GRC, Radiant Logic offers advanced controls to ensure policies conform to principles of Segregation of Duties and Zero Trust principles. Only Radiant Logic combines the best of full-suite IGA with the ease-of-use of IGA light, making it the solution for IGA that works.
Leave a comment »